As the meltdown/spectre problem affects several CPU architectures, it makessense to have common way to express whether a system is affected by aparticular vulnerability or not. If affected the way to express themitigation should be common as well.

cpu_capacity: capacity of cpu#.++What: /sys/devices/system/cpu/vulnerabilities+ /sys/devices/system/cpu/vulnerabilities/meltdown+ /sys/devices/system/cpu/vulnerabilities/spectre_v1+ /sys/devices/system/cpu/vulnerabilities/spectre_v2+Date: Januar 2018+Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>+Description: Information about CPU vulnerabilities++ The files are named after the code names of CPU+ vulnerabilities. The output of those files reflects the+ state of the CPUs in the system. Possible output values:++ "Not affected" CPU is not affected by the vulnerability+ "Vulnerable" CPU is affected and no mitigation in effect+ "Mitigation: $M" CPU is affetcted and mitigation $M is in effect--- a/drivers/base/Kconfig+++ b/drivers/base/Kconfig@@ -236,6 +236,9 @@ config GENERIC_CPU_DEVICES config GENERIC_CPU_AUTOPROBE bool